Advisory Details

July 28th, 2022

VMware ESXi TCP/IP Memory Corruption Remote Code Execution Vulnerability

ZDI-22-1021
ZDI-CAN-16259

CVE ID
CVSS SCORE 8.1, AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS VMware
AFFECTED PRODUCTS ESXi
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on affected installations of VMware ESXi. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the TCP/IP kernel module. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the kernel.

ADDITIONAL DETAILS

https://docs.vmware.com/en/VMware-vSphere/7.0/rn/vsphere-esxi-70u3f-release-notes.html
https://docs.vmware.com/en/VMware-vSphere/6.7/rn/esxi670-202206001.html
https://docs.vmware.com/en/VMware-vSphere/6.5/rn/esxi650-202205001.html


DISCLOSURE TIMELINE
  • 2022-01-12 - Vulnerability reported to vendor
  • 2022-07-28 - Coordinated public release of advisory
  • 2022-07-28 - Advisory Updated
CREDIT Reno Robert of Trend Micro Zero Day Initiative
BACK TO ADVISORIES